同时,在借鉴国内外研究成果的基础上,探讨了攻击路径的自动生成算法以及对攻击图相关的算法之间的优缺点进行了比较。
It has profited from the domestic and foreign research results, in this foundation, it discussed automatic production of attack path, as well as attack graph algorithm comparison.
图象匹配介绍了印章提取、印章匹配,MAD准则的相关算法和识别判决是关键技术。
The latter introduces badge extracting and badge matching, MAD correlation algorithm and recognition judgment are key technologies.
本论文最后给出了相关业务算法和流程图,以及数据库的创建和数据的安全迁移的实现。
This paper finally produced the conelation service algorithm and the flow chart, as well as database foundation and safe migration realization.
应用推荐